978-0133940305 Chapter 10 Part 1

subject Type Homework Help
subject Pages 9
subject Words 2112
subject Authors Christoph Schneider, Joseph Valacich

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Information Systems Today, 7e (Valacich)
Chapter 10 Securing Information Systems
1) Which of the following is the most accurate definition of a computer crime?
A) the act of using a computer to commit an illegal act
B) the act of using someone's computer to browse the Internet
C) the act of using someone's computer to check e-mail
D) the act of stealing a computer and related hardware
E) the act of providing personal information to Web sites when shopping
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
2) The individuals who are knowledgeable enough to gain access to computer systems without
authorization are referred to as ________.
A) hackers
B) bots
C) online predators
D) worms
E) power users
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
3) Which of the following is one of the main federal laws against computer crimes in the United
States?
A) Satellite Act of 1962
B) Trade Expansions Act of 1962
C) United States Information and Educational Exchange Act
D) Central Intelligence Agency Act
E) Electronic Communications Privacy Act of 1986
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
1
page-pf2
4) The Computer Fraud and Abuse Act of 1986 prohibits ________.
A) accessing company intranet and confidential information from public computers
B) stealing or compromising data about national defense, foreign relations, atomic energy, or
other restricted information
C) the use of external devices to provide access and information to companies' confidential
information
D) signing contracts with consultants outside the United States to process information
E) access to companies' extranets when outsourcing work to clients overseas
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
5) Which of the following U.S. laws amended the Computer Fraud and Abuse Act to allow
investigators to easily access voice-related communications?
A) the Non-Detention Act
B) the Espionage Act
C) the Patriot Act
D) the Video Privacy Protection Act
E) the Clery Act
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
6) Violating data belonging to banks or other financial institutions is a crime in the United States.
Which of the following legislations prohibit such violations?
A) the Foreign Intelligence Surveillance Act
B) the Computer Fraud and Abuse Act
C) the Patriot Act
D) the Glass-Steagall Act
E) the Electronic Communications Privacy Act
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
2
page-pf3
7) Some violations of state and federal computer crime laws are punishable by fines and by not
more than one year in prison. Such violations are charged as ________.
A) misdemeanors
B) felonies
C) embezzlements
D) indictments
E) larcenies
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
8) Computer criminals who attempt to break into systems or deface Web sites to promote
political or ideological goals are called ________.
A) hacktivists
B) crackers
C) social promoters
D) internet activists
E) online predators
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
9) People who break into computer systems with the intention of doing damage or committing a
crime are called ________.
A) bots
B) white hats
C) worms
D) cyber spies
E) crackers
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
3
page-pf4
10) WikiLeaks is a famous not-for-profit whistleblower Web site. MasterCard and Visa stopped
payments to WikiLeaks after a series of leaks by the site. An anonymous group attacked the Web
sites of both MasterCard and Visa reacting to this. These Web vandals, who tried to protect
WikiLeaks, are called ________.
A) hacktivists
B) bots
C) ethical hackers
D) patriot hackers
E) cyber soldiers
Difficulty: Moderate
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
11) Employees steal time on company computers to do personal business. This is an example of
________.
A) unauthorized access
B) hacking
C) vandalism
D) cyberstalking
E) functional inconvenience
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
12) Identify a true statement about a vulnerability scanner.
A) It analyzes network traffic and captures unencrypted passwords.
B) It presents a view of long-term technology integration.
C) It tests targeted systems for weaknesses.
D) It presents a view of short-term technology integration.
E) It ensures high-quality leads when a search is conducted online.
Difficulty: Moderate
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
4
page-pf5
13) ________ targeted at networks is designed to spread by itself without the need for an
infected host file to be shared.
A) Adware
B) Spyware
C) A worm
D) Spam
E) A logic bomb
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
14) Ronald downloads a movie from the Internet onto his company's computer. During this
process, his system gets infected with a virus. The virus spreads rapidly in the company's
network causing the server to crash. This type of virus is most likely to be ________.
A) adware
B) phishing mail
C) spam
D) a worm
E) a Trojan horse
Difficulty: Moderate
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Application
15) When Shelly downloaded an arcade game from an unknown Internet Web site, an
unauthorized connection unknown to Shelly was established with her computer. The arcade game
is most likely to be ________.
A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
5
page-pf6
16) While adding information to the employee information database, Neil's computer crashed,
and the entire database was erased. Which of the following types of viruses caused Neil's
computer to crash?
A) spyware
B) worms
C) adware
D) logic bombs
E) encryption
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Application
17) Computers that are located in homes, schools, and businesses are infected with viruses or
worms to create armies of zombie computers to execute ________ attacks.
A) digital marketing
B) malware
C) adware
D) denial-of-service
E) product-as-service
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
18) Identify a true statement about a packet sniffer.
A) It is used to analyze network traffic.
B) It is used to test targeted systems for weaknesses.
C) It is used to break passwords using a brute-force approach.
D) It is used to capture encrypted passwords.
E) It is used to redirect web pages to different sites if any link fails.
Difficulty: Moderate
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Application
6
page-pf7
19) ________ refers to any software that covertly gathers information about a user through an
Internet connection without the user's knowledge.
A) Spyware
B) Spam
C) Web filter
D) Cookie
E) Bot herder
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
20) Which of the following terms refers to junk newsgroup postings used for the purpose of
advertising for some product or service?
A) spam
B) adware
C) cookie
D) bot herder
E) Web filter
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
21) Robert receives an e-mail which says that he has won an online lottery worth $50 billion.
Robert has his doubts as he does not remember buying a lottery ticket. He finds out that it is a
spam e-mail intended to obtain his bank account details and credit card number. Which of the
following is evident here?
A) a logic bomb
B) hacktivism
C) phishing
D) tunneling
E) a worm
Difficulty: Moderate
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Application
7
page-pf8
22) ________ is an attempt to trick financial account and credit card holders into giving away
their authentication information, usually by sending spam messages to literally millions of e-mail
accounts.
A) Phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
23) ________ is a more sophisticated fraudulent e-mail attack that targets a specific person or
organization by personalizing the message in order to make the message appear as if it is from a
trusted source.
A) Spear phishing
B) Cyber tunneling
C) Viral marketing
D) Logic bombing
E) Hacking
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
24) A ________ is a small text file passed to a Web browser on a user's computer by a Web
server.
A) cookie
B) botnet
C) honeypot
D) worm
E) virus
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
8
page-pf9
25) When using Yahoo Messenger, Roger gets an unsolicited advertisement from a company. The
advertisement contains a link to connect to the merchant's Web site. Which of the following is
the most suitable way of describing this type of advertisement?
A) adware
B) cookie
C) Internet hoax
D) spam
E) cyber squatting
Difficulty: Moderate
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Application
26) A(n) ________ typically consists of a distorted image displaying a combination of letters
and/or numbers that a user has to input into a form before submitting it.
A) American Standard Code for Information Interchange (ASCII)
B) Comprehensive TeX Archive Network (CTAN)
C) Entity-Relationship Diagram (ERD)
D) Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
E) Organization for the Advancement of Structured Information Standards (OASIS)
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
27) Which of the following is the most accurate definition of a botnet?
A) a fraudulent e-mail attack that targets a specific person or organization by personalizing the
message
B) spider software used by a search algorithm to crawl various Web sites to return a query
C) a small text file passed to a Web browser on a user's computer by a Web server
D) a common platform used by search engines to index the contents of a Web site
E) destructive software robots working together on a collection of zombie computers via the
Internet
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
9
page-pfa
28) ________ is the stealing of another person's Social Security number, credit card number, and
other personal information for the purpose of using the victim's credit rating to borrow money,
buy merchandise, and otherwise run up debts that are never repaid.
A) Logic bombing
B) Battery
C) Spear phishing
D) Bot herding
E) Identity theft
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
29) ________ contains spyware that collects information about a person's Web surfing behavior
in order to customize Web site banner advertisements.
A) Adware
B) Malware
C) Firmware
D) A cookie
E) A honeypot
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
30) ________ are false messages circulated online about new viruses, earthquakes, kids in
trouble, cancer causes, or any other topic of public interest.
A) Internet hoaxes
B) Honeypots
C) Cookies
D) Logic bombs
E) Malware
Difficulty: Easy
Learning Obj.: 10.1: Define computer crime and describe several types of computer crime.
Classification: Concept
10

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.